Security of Poseidon hash function against non-binary differential and linear attacks
Saved in:
| Date: | 2021 |
|---|---|
| Main Authors: | L. Kovalchuk, R. Oliynykov, M. Rodinko |
| Format: | Article |
| Language: | English |
| Published: |
2021
|
| Series: | Cybernetics and Systems Analysis |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001221027 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Hash functions and integrity of information objects
by: Mаtоv, O. Ya., et al.
Published: (2014)
by: Mаtоv, O. Ya., et al.
Published: (2014)
Modeling of Attack Detection System based on Hybridization of Binary Classifiers
by: O. I. Belei, et al.
Published: (2020)
by: O. I. Belei, et al.
Published: (2020)
Security estimates of a Ring-LWE symmetric cryptosystem against chosen plaintext attack
by: S. M. Ignatenko
Published: (2020)
by: S. M. Ignatenko
Published: (2020)
Asymptotic Estimates of Universal Hashing on Algebraic Curves
by: Ye. V. Kotukh
Published: (2017)
by: Ye. V. Kotukh
Published: (2017)
Security Justification for Strumok Stream Cipher Against Correlation Attacks Over Finite Fields of Characteristic 2
by: A. M. Oleksiichuk, et al.
Published: (2019)
by: A. M. Oleksiichuk, et al.
Published: (2019)
The experimental-methodical geophysical studies in the RV POSEIDON cruise 405
by: Bialas, J., et al.
Published: (2011)
by: Bialas, J., et al.
Published: (2011)
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
A model of control for counterac-ting against information attacks in cyberspace
by: A. A. Shyian, et al.
Published: (2021)
by: A. A. Shyian, et al.
Published: (2021)
A method for security evaluation of SNOW 2.0-like ciphers against correlation attacks over finite extensions of the field of two elements
by: A. N. Aleksejchuk, et al.
Published: (2020)
by: A. N. Aleksejchuk, et al.
Published: (2020)
A three-layer defense mechanism based on web servers against distributed denial of service attacks
by: A. T. Rakhmanov, et al.
Published: (2019)
by: A. T. Rakhmanov, et al.
Published: (2019)
Linear differential-functional equations with absolutely unstable solutions
by: Yu. Sliusarchuk
Published: (2019)
by: Yu. Sliusarchuk
Published: (2019)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Yu. Zubok
Published: (2020)
by: Yu. Zubok
Published: (2020)
Integrated security systems for protecting payment synchronization from MITM attacks
by: Shahmatov, I.O., et al.
Published: (2025)
by: Shahmatov, I.O., et al.
Published: (2025)
Features of adsorption of binary mixtures of cationic and non-ionic surfactants by non-porous carbon sorbent
by: O. D. Kochkodan, et al.
Published: (2019)
by: O. D. Kochkodan, et al.
Published: (2019)
Asymptotic limits of solutions of linear systems of functional-differential equations with linear and constant delays
by: H. P. Peliukh, et al.
Published: (2020)
by: H. P. Peliukh, et al.
Published: (2020)
Non-asymptotic lower bounds for the data complexity of statistical attacks on symmetric cryptosystems
by: A. N. Aleksejchuk
Published: (2018)
by: A. N. Aleksejchuk
Published: (2018)
Asymptotic behavior of solutions of the differential-functional equation with linearly transformed argument
by: G. P. Peljukh, et al.
Published: (2020)
by: G. P. Peljukh, et al.
Published: (2020)
Asymptotic estimates for the solutions of a differential-functional equation with linear delay
by: G. P. Peljukh, et al.
Published: (2019)
by: G. P. Peljukh, et al.
Published: (2019)
On asymptotic properties of solutions to differential-functional equations with linearly transformed argument
by: D. V. Belskij, et al.
Published: (2017)
by: D. V. Belskij, et al.
Published: (2017)
On the principle of comparison and estimates of the Lyapunov functions for non-linear systems
by: A. A. Martynjuk
Published: (2018)
by: A. A. Martynjuk
Published: (2018)
Adaptive Computation of Curve Lengths Given by Non-differentiable Functions
by: Sheludko, Helii A., et al.
Published: (2020)
by: Sheludko, Helii A., et al.
Published: (2020)
Adaptive Computation of Curve Lengths Given by Non-differentiable Functions
by: Sheludko, Helii A., et al.
Published: (2020)
by: Sheludko, Helii A., et al.
Published: (2020)
Adaptive Computation of Curve Lengths Given by Non-differentiable Functions
by: H. A. Sheludko, et al.
Published: (2020)
by: H. A. Sheludko, et al.
Published: (2020)
Non-classical differentiation in algebras of analytical functions of bounded type
by: H. M. Pryimak
Published: (2017)
by: H. M. Pryimak
Published: (2017)
Boundary value problem for certain classes of non-linear ordinary differential equations with free boundary
by: Tovmasyan, N.E.
Published: (1999)
by: Tovmasyan, N.E.
Published: (1999)
Asymptotic properties of solutions of the functional-differential equation with a linearly transformed argument
by: G. P. Peljukh, et al.
Published: (2018)
by: G. P. Peljukh, et al.
Published: (2018)
Asymptotic behavior of solutions of the functional-differential equation with a linearly transformed argument
by: G. P. Peljukh, et al.
Published: (2019)
by: G. P. Peljukh, et al.
Published: (2019)
On a periodic type boundary-value problem for first order linear functional differential equations
by: Hakl, R., et al.
Published: (2002)
by: Hakl, R., et al.
Published: (2002)
Approximation of classes of (ψ,β)-differentiable functions by Rogozinski polynomials
by: I. R. Kovalchuk
Published: (2017)
by: I. R. Kovalchuk
Published: (2017)
First principle methods for calculating the linear coefficient of thermal expansion of quasi-binary eutectic systems
by: D. A. Zakarian, et al.
Published: (2021)
by: D. A. Zakarian, et al.
Published: (2021)
Hemostasis indices in transient ischemic attacks
by: I. A. Hryhorova, et al.
Published: (2021)
by: I. A. Hryhorova, et al.
Published: (2021)
Comparison theorems from the theory of monotone dynamical systems for linear systems of functional-differential equations with linearly transformed argument
by: H. P. Peliukh, et al.
Published: (2021)
by: H. P. Peliukh, et al.
Published: (2021)
New development of homotopy analysis method for non-linear integro-differential equations with initial value problems
by: Z. Eshkuvatov
Published: (2022)
by: Z. Eshkuvatov
Published: (2022)
On Linear Relations Generated by Nonnegative Operator Function and Degenerate Elliptic Differential-Operator Expression
by: Bruk, V.M.
Published: (2009)
by: Bruk, V.M.
Published: (2009)
Quasiperiodic solutions of functional-singularly perturbed linear ordinary higher-order differential equations
by: V. O. Yeromenko, et al.
Published: (2018)
by: V. O. Yeromenko, et al.
Published: (2018)
On the asymptotic properties of solutions of the inhomogeneous functional-differential equation with a linearly transformed argument
by: G. P. Peljukh, et al.
Published: (2018)
by: G. P. Peljukh, et al.
Published: (2018)
Asymptotic boundaries of solutions to a differential-functional equation with a linearly transformed argument
by: D. V. Belskij, et al.
Published: (2017)
by: D. V. Belskij, et al.
Published: (2017)
Реконструкція забруднення Чорного моря радіоактивним ¹³⁷Cs у період з 1945 по 2020 роки за допомогою камерної моделі POSEIDON-R
by: Беженар, Р.В.
Published: (2019)
by: Беженар, Р.В.
Published: (2019)
Application of the Green–Samoilenko function and operator to the study of non-Lipschitz differential equations
by: M. O. Perestiuk, et al.
Published: (2021)
by: M. O. Perestiuk, et al.
Published: (2021)
Similar Items
-
Hash functions and integrity of information objects
by: Mаtоv, O. Ya., et al.
Published: (2014) -
Modeling of Attack Detection System based on Hybridization of Binary Classifiers
by: O. I. Belei, et al.
Published: (2020) -
Security estimates of a Ring-LWE symmetric cryptosystem against chosen plaintext attack
by: S. M. Ignatenko
Published: (2020) -
Asymptotic Estimates of Universal Hashing on Algebraic Curves
by: Ye. V. Kotukh
Published: (2017) -
Security Justification for Strumok Stream Cipher Against Correlation Attacks Over Finite Fields of Characteristic 2
by: A. M. Oleksiichuk, et al.
Published: (2019)